Empo Tech Module 2

Descargar como docx, pdf o txt
Descargar como docx, pdf o txt
Está en la página 1de 21

Empowerment

Technologies
Quarter 1 – Module 2:
Netiquettes
Empowerment Technologies
Alternative Delivery Mode
Quarter 1 – Module 2: Netiquettes
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every
effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education Secretary:


Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Author: Merry Grace V. Manucduc
Editor: Grace T. Balverde
Reviewers: Lorena J. Mutas
Illustrator: Amado S. Banawa Jr
Layout Artist: Melody Z. De Castro
Management Team: Malcom S. Garma, Director IV
Genia V. Santos, CLMD Chief
Dennis M. Mendoza, Regional EPS In-Charge of LRMS
Micah S. Pacheco, Regional ADM Coordinator
Loida O. Balasa, CID Chief
Grace R. Nieves, Division EPS In-Charge of LRMS
Lorena J. Mutas, Division ADM Coordinator

Printed in the Philippines by

Department of Education – National Capital Region

Office Address: Misamis St., Bago Bantay, Quezon City

Telefax:
E-mail Address: 02-929-0153 [email protected]
Empowerment Technologies
Quarter 1 – Module 2: Netiquettes
Introductory Message
For the facilitator:

Welcome to the Empowerment Technologies for Senior High School Alternative


Delivery Mode (ADM) Module on Netiquettes!

This module was collaboratively designed, developed and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.

This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of the module:

As a facilitator you are expected to orient the learners on how to use this module. You also need
to keep track of the learners' progress while allowing them to manage their own learning.
Furthermore, you are expected to encourage and assist the learners as they do the tasks
included in the module.

For the learner:

ii
Welcome to the Empowerment Technologies for Senior High School Alternative
Delivery Mode (ADM) Module on Netiquettes!

The hand is one of the most symbolized part of the human body. It is often used to depict skill,
action and purpose. Through our hands we may learn, create and accomplish. Hence, the hand in
this learning resource signifies that you as a learner is capable and empowered to successfully
achieve the relevant competencies and skills at your own pace and time. Your academic success
lies in your own hands!

This module was designed to provide you with fun and meaningful opportunities for guided and
independent learning at your own pace and time. You will be enabled to process the contents of
the learning resource while being an active learner.

This module has the following parts and corresponding icons:

What’s New

What I Need to Know

What is It

What I Know What’s More

What’s In What I Have Learned

iii
In this portion, the new lesson will be introduced to you in
various ways such as a story, a song, a poem, a problem opener,
What I Can Do
an activity or a situation.
This will give you an idea of the This section provides a brief discussion of the lesson. This aims
skills or competencies you are to help you discover and understand new concepts and skills.
expected to learn in the module.
This comprises activities for independent practice to solidify
This part includes an activity your understanding and skills of the topic. You may check the
that aims to check what you answers to the exercises using the Answer Key at the end of the
already know about the lesson module.
to take. If you get all the answers
correct (100%), you may decide This includes questions or blank sentence/paragraph to be filled
to skip this module. in to process what you learned from the lesson.

This is a brief drill or review to This section provides an activity which will help you transfer
help you link the current lesson your new knowledge or skill into real life situations or concerns.
with the previous
Assessment This is a task which aims to evaluate your level of
mastery in achieving the learning competency.

Additional Activities In this portion, another activity will be


given to you to enrich your knowledge or skill of the
lesson learned. This also tends retention of learned
concepts.

Answer Key This contains answers to all activities in the


module.

At the end of this module you will also find:

References This is a list of all sources used in developing

iv
this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities included
in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult
your teacher or facilitator. Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and gain deep
understanding of the relevant competencies. You can do it!

v
What I Need to Know

This module was designed and written with you in mind. It is here to help you apply
online safety, security, ethics, etiquette standards, and practice in using ICTs related to your
specific professional tracks. The scope of this module permits it to be used in different learning
situations. The language used recognizes the diverse vocabulary level of students. The lessons
are arranged to follow the standard sequence of the course. But the order in which you read
them can be changed to correspond with the textbook you are now using.

The module mainly focuses on one lesson:

• Lesson 1 – Netiquettes

The module mainly explains and instructs learners about Netiquettes or online
etiquette.

After going through this module, you are expected to:


1. apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs
as it would relate to their specific professional tracks; and

What I Know

Privacy, security, and good netizenship are essential words that you have to remember
when you are on the Internet. Do you know your limitations in social media? Do you feel
responsible for what you are posting? Do you think first before you click? Let us find out!

Answer Yes, if you agree with the statement, and No, if you disagree. Write your answer
on the blank before each number.

1. My computer has an antivirus, so it is okay to open most email attachments like e-cards and
video files.

2. Your friend told you that his college application was rejected because you posted a video of
him doing crazy stuff at a party. You posted the video several years ago but later took it down
to protect your friend's reputation. Is it possible that the college found the video?

1
3. You and your best friend play a lot of video games. One time, she asks you for your password
so she can help you level up and get in-game money. She promises to keep your password a
secret. Is it okay to give away your password?

4. You received an email stating that your mother's bank account is going to be forfeited if you
do not respond to the email. Is it safe to reply?

5. You forgot that your essay for English class is due tomorrow. While doing your research, you
found a website offering free essays.

6. There is a danger in posting information about a future vacation.


7. Letting people know your birthday is probably a must if you want to get as many gifts as
possible. But having it in your profile makes you vulnerable to identity theft.

______________8. If there is no copyright notice, it's okay to copy a Web page.

______________9. Lurking is sometimes considered impolite. It is the practice of reading discussions


without contributing to them

____________ 10. Your cousin asked for your fabulous zucchini cake recipe at the last family
function. While you're sending it to him, you decide to e-mail it to all 500 people
in your address book as well. It is an example of email spam.

_____________11. If someone insults and uses offensive language towards you online, you should
reply in the same manner.

_____________12. If someone uses offensive language online, always respond and not worry

as no one knows who you are online.

_____________13. It is ok to constantly give our friends e-mail or items online which they do not
need.

_____________14. Remember your audience. If you are putting something on a web page
remember that everyone in the world will have access to it.
_____________15. You are responsible for your actions on the internet.

2
Lesson
Netiquettes
1
In this generation, people are dependent on the Internet. Like how people socialize face
to face, we should follow etiquette at all times as it mirrors our personality. Being on different
platforms, we should be aware of our actions and protect ourselves at the same time. Remember
that once something has been shared online, it cannot be deleted.

What's In

This lesson provides information about Netiquette. It will serve as your guide on how to
behave appropriately online. It is vital to use Netiquette because communication online is non-
verbal. Most often, online discussion consists of reading something someone else’s has typed.

What's New

Compare and contrast the scenario in the picture. Describe how Jimmy and Boggart are
the same and different and in using social media. Plot your answer in the Venn diagram.

3
Jimmy Boggart

4
What is It

Core Rules of Netiquette


Netiquette, or network etiquette, is concerned with the "proper" manner of
communication in the online environment. Whenever you communicate in the virtual world,
consider the following "rules," adapted from Virginia Shea's Core Rules of Netiquette.

Rule 1: Remember the Human


When communicating electronically, whether through email, instant message, discussion
post, text, or another method, practice the Golden Rule: Do unto others as you would have others
do unto you. Remember, your written words are read by real people, all deserving of respectful
communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if
someone else had written it?"
Rule 2: Adhere to the same standards of behavior online that you follow in real life
While it can be argued that standards of behavior may be different in the virtual world,
they certainly should not be lower. You should do your best to act within the laws and ethical
manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone
face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.

Rule 3: Know where you are in cyberspace


"Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in
the virtual world, the same written communication can be acceptable in one area, where it might
be considered inappropriate in another. What you text to a friend may not be appropriate in an
email to a classmate or colleague. Can you think of another example?

Rule 4: Respect other people's time and bandwidth


Electronic communication takes time: time to read and time in which to respond. Most
people today lead busy lives, just like you do, and don't have time to read or respond to frivolous
emails or discussion posts. As a virtual world communicator, it is your responsibility to make
sure that the time spent reading your words isn't wasted. Make your written communication
meaningful and to the point, without extraneous text or superfluous graphics or attachments
that may take forever to download.

Rule 5: Make yourself look good online


One of the virtual world's best things is the lack of judgment associated with your
physical appearance, the sound of your voice, or the clothes you wear (unless you post a video of
yourself singing Karaoke in a clown outfit.) The quality of your writing will judge you, so keep
the following tips in mind:

Always check for spelling and grammar errors

Know what you're talking about and state it clearly

5
Be pleasant and polite
Rule 6: Share expert knowledge
The Internet offers its users many benefits; one is the ease in which information can be
shared or accessed, and in fact, this "information sharing" capability is one of the reasons the
Internet was founded. So in the spirit of the Internet's "founding fathers," share what you know!
When you post a question and receive intelligent answers, share the results with others. Are you
an expert at something? Post resources and references for your subject matter. You have recently
expanded your knowledge about a subject that might be of interest to others? Share that as well.

Rule 7: Help keep flame wars under control


What is meant by "flaming" and "flame wars?" "Flaming is what people do when they
express a strongly held opinion without holding back any emotion." (Shea, 1994). As an example,
think of the kinds of passionate comments you might read on a sports blog. While "flaming" is
not necessarily forbidden in virtual communication, "flame wars," when two or three people
exchange angry posts between one another, must be controlled, or the camaraderie of the group
could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to
a more productive direction.

Rule 8: Respect other people's privacy


Depending on what you are reading in the virtual world, be it an online class discussion
forum, Facebook page, or an email, you may be exposed to some private or personal information
that needs to be handled with care. Perhaps someone is sharing some medical news about a
loved one or discussing a situation at work. What do you think would happen if this information
"got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect
others to respect your privacy, so should you respect the privacy of others. Be sure to err on the
side of caution when deciding to discuss or not to discuss virtual communication.

Rule 9: Don't abuse your power


Like in face-to-face situations, there are people in cyberspace who have more "power"
than others. They have more expertise in technology or have years of experience in a particular
skill or subject matter. Maybe it is you who possesses all of this knowledge and power! Just
remember: knowing more than others do or having more power than others may have does not
give you the right to take advantage of anyone. Think of Rule 1: Remember the human.

6
Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience working in the virtual world. And not
everyone knows the rules of Netiquette. At some point, you will see a stupid question, read an
unnecessarily long response, or encounter misspelled words; when this happens, practice
kindness and forgiveness as you would hope someone would do if you had committed the same
offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to
a mistake, do so in a private email rather than a public forum.

Shea, V. (1994). Core Rules of Netiquette. Retrieved from


http:/coursedesign.colostate.edu/obj/corerulesnet.html

What's More

Let's Reflect!
Make a reflection on the importance of using Netiquette in your daily life. What benefits
can you get from it? How can you promote the use of these regulations?

7
What I Have Learned

Accomplish the items below using what you have learned from the Ten Rules of Netiquette.

1. In cyberspace, it is important to remember the . “Do unto others as you would have others
do unto you.”
2. Why are spelling and grammar crucial on the Internet?
3. Is it okay to read other people's files and emails without their permission?
Why?
4. What do you need to be careful about if you are in control of a network?
8
5. What should you do about a newbie who continually makes the same error on the
Internet?

Assessment

Apply what you have learned from Virginia Shea’s Rules of Netiquette. Choose
the letter of the best answer and write it in your notebook.

1. What is Netiquette?
A. Using a net to catch fish
B. Being mean to other people on Facebook
C. Presenting proper manners at the dinner table
D. Showing manners and etiquette on the Internet

2. What should you do if you receive a text or email from someone you don't
know?
A. Call the police
B. Delete it without opening it
C. Open it immediately and reply
D. Leave it in your inbox until you figure out who it is

3. Which of the following should you never give on the Internet?


A. Your age
B. Your name
C. Your address
D. All of the above

4. What should you do to avoid being cyber-bullied?


A. Observe proper netiquette rules
B. Give out personal information to anyone who asks
C. Ignore any requests from people to be your friend online
D. Strike first - post mean things about other people on your
Facebook Wall

5. What should you do if you feel you are being cyber-bullied?


A. Call the police
B. Tell no one, it's embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the Internet

9
6. What should you never do if you get an embarrassing picture from
someone?
A. Talk to the person again
B. Send it on to other friends
C. Tell your parents or a teacher
D. Discourage the person from sending pictures like that

7. What should you avoid doing in a chat room?


A. Posting your address
B. Posting your phone number C. Revealing financial information
D. All of the above.

8. It is OK to forward or post an email message that you received


if_____________
A. The message is typed in all capital letters
B. It does not contain any copyrighted material
C. The author of the message has marked it as confidential.
D. The author of the message hasn’t given you permission to forward or
post it

9. Before posting to a discussion group you should _____________________


A. Read the FAQ
B. Find the Frequently Asked Questions (FAQ) document
C. Read some of the existing posts to get an idea of the tone and
character of the group
D. All of the above.

10. A flame is _____________________________


A. An online chain letter
B. An expert programmer
C. A person who consistently breaks the rules of Netiquette
D. a post or email message that expresses a strong opinion or criticism

11. The Golden Rule of Netiquette is __________________________ A. Remember


the human!
B. A smiley in every message
C. Don't follow the rules of netiquette D. Type in all
caps when you're angry.

12. Spamming is very poor Netiquette and means ____________________


A. Spilling the juice of meat-byproducts into your keyboard
B. Sending in lines of nonsensical garbage in a chat conversation
C. Posting or emailing unsolicited advertising messages to a wide
audience.
D. Posting a message that contains graphic descriptions of something
really gross

10
13. Knowledge and understanding of netiquette is useful because _________

A. It will help you create a positive impression on those you meet in


cyberspace
B. It explains the conventions already being used by millions of
cybernauts C. It explains some of the technical limitations of online
communications
D. all of the above.

14. You've been sent a virus warning, what should you do now? A. Ignore it.
B. Forward it within your company.
C. Forward it to everyone in your address book.
D. Go to a security Web site to learn if it is a real virus.

15. As a common courtesy, when in a chat room you should:

A. Report disruptive users


B. Introduce yourself when you enter a room
C. Make it clear when you are directing a question or response to a
specific user
D. All of the above

11
For inquiries or feedback, please write or call:

Department of Education - Bureau of Learning Resources (DepEd-BLR)

Ground Floor, Bonifacio Bldg., DepEd Complex Meralco


Avenue, Pasig City, Philippines 1600

Telefax: (632) 8634-1072; 8634-1054; 8631-4985


Email Address: [email protected] * [email protected]

También podría gustarte